You are here

Method of detecting compromised computers in a network

Title: Method of detecting compromised computers in a network.
5 views
0 downloads
Name(s): Duan, Zhenhai, inventor
Type of Resource: text
Genre: Utility
Text
Date Created: 2010-04-19
Date Issued: 2012-10-02
Physical Form: computer
online resource
Extent: 1 online resource
Language(s): English
Abstract/Description: A method of detecting a compromised machine on a network. The method receives an email message from a machine on the network and classifies it as either spam or non-spam. A probability ratio is then updated, according to whether the message was spam or non-spam, by applying a sequential probability ratio test. If the probability ratio is greater than or equal to a first threshold, then the machine is compromised. If the probability ratio is less than or equal to a second threshold, then the machine is normal. The operations of receiving a message, classifying the message, updating the probability ratio, and indicating the machine is normal or compromised until the probability ratio is greater than or equal to the first threshold are repeated for a plurality of messages. Such repeated operations are performed on each of the messages one at a time, as each of the messages is received.
Identifier: FSU_uspto_8280968 (IID), 8280968 (patent number), 2145251 (inventor key), 12/762714 (app id), 6c9256d97d167832cbab694dc904bd27 (assignee id)
Cited by US patents: 5
Persistent Link to This Record: http://purl.flvc.org/fsu/fd/FSU_uspto_8280968
Use and Reproduction: Copyright not evaluated
Owner Institution: FSU

Choose the citation style.
Method of detecting compromised computers in a network. (2012). Method of detecting compromised computers in a network. Retrieved from http://purl.flvc.org/fsu/fd/FSU_uspto_8280968